reneoliveirajr / wp_CVE-2020-35489_checker
WordPress Sites Vulnerability Checker for CVE-2020-35489 - "Educational Use Only"
☆11Updated last year
Alternatives and similar repositories for wp_CVE-2020-35489_checker:
Users that are interested in wp_CVE-2020-35489_checker are comparing it to the libraries listed below
- ☆13Updated last year
- A PHP script demonstrating cookie stealing by capturing and logging request information, including the victim's cookie, IP address, HTTP …☆34Updated last year
- XML-RPC Vulnerability Checker and Directory Fuzzer☆23Updated last year
- JoomSploit is a script designed to escalate a Cross-Site Scripting (XSS) vulnerability to Remote Code Execution (RCE) or other's critical…☆26Updated last year
- ProxyChecker Made in NodeJS☆37Updated 2 years ago
- xdebug 2.5.5 RCE exploit☆30Updated last month
- There were no proper POCs for CVE-2023-30533 so I made one. (Reported by Vsevolod Kokorin)☆9Updated last year
- Brute forcing login pages with SQL Injection queries with cURL☆17Updated last year
- PHP lab to test captcha bypassing☆32Updated last year
- 「💥」CVE-2022-33891 - Apache Spark Command Injection☆26Updated 2 years ago
- CVE-2023-28121 - WooCommerce Payments < 5.6.2 - Unauthenticated Privilege Escalation [ Mass Add Admin User ]☆11Updated last year
- simple recon tool to help you for searching vulnerability on web server☆73Updated last month
- Simple-XSS is a multiplatform cross-site scripting (XSS) vulnerability exploitation tool.☆45Updated 8 months ago
- CVE-2024-29895 PoC - Exploiting remote command execution in Cacti servers using the 1.3.X DEV branch builds☆21Updated 9 months ago
- A python script to check if URLs are allowed or disallowed by a robots.txt file.☆21Updated last week
- ( Wordpress Exploit ) Wordpress Multiple themes - Unauthenticated Arbitrary File Upload☆11Updated 2 years ago
- F5 BIG-IP Scanner scans for servers on shodan and checks to see if they are vulnerable.☆17Updated 2 years ago
- A PoC exploit for CVE-2024-25600 - WordPress Bricks Builder Remote Code Execution (RCE)☆33Updated 11 months ago
- CVE-2023-38389 < Wordpress < JupiterX Core < Unauthenticated Account Takeover☆27Updated 6 months ago
- Tool for bypassing logins vulnerable against SQL injection☆44Updated 10 months ago
- APK Infrastructure Investigator☆63Updated last year
- Auto exploitation tool for CVE-2024-24401.☆32Updated 5 months ago
- ☆11Updated last year
- udpy_proto_scanner is a Python script which discovers UDP services by sending triggers to a list of hosts☆46Updated last year
- ☆16Updated last year
- This is a working variant of the Mirai IOT botnet☆13Updated 2 years ago
- vsftpd 3.0.3 Exploit - Remote Denial of Service☆25Updated 3 years ago
- Valhalla finds vulnerable devices on shodan, it can also scan a list of domains to find vulnerabilities.☆43Updated last year
- Payload generator to exfiltrate user cookies through the PHP info page bypassing the HttpOnly flag during XSS exploitation.☆19Updated last year
- Unauthorized Access to Metadata and User Data like CTF☆26Updated 2 months ago